Term
| What type of motherboards use a riser card for providing expansion slots? |
|
Definition
|
|
Term
| What is another (and official) name for IDE and EIDE drives? |
|
Definition
|
|
Term
| What port is commonly used to connect a keyboard and a mouse? |
|
Definition
|
|
Term
| What expansion port is always used for a high-speed, high-resolution, 3-D graphics video adapter? |
|
Definition
|
|
Term
| What port is considered the fastest and supports a number of external devices for a laptop as well as for desktops? |
|
Definition
|
|
Term
| What typ of PC Cards are commonly used for devices such as network adapters, sound cards, and modems in laptops? |
|
Definition
|
|
Term
| What ACPI-defined power states the standby mode in Windows? |
|
Definition
|
|
Term
| What operating system is distributed as open source and does not have a standard GUI? |
|
Definition
|
|
Term
| What file permission is not a standard NTFS permission but a special permission? |
|
Definition
|
|
Term
| How can you create an ERD for a Windows XP Professional computer? |
|
Definition
|
|
Term
| How much voltage is discharged from the EP drum in a laser printer by the laser beam that scans the drum with the information about the image? |
|
Definition
|
|
Term
| What form of measure is used to represnt the printing speed of a dot-matrix printer? |
|
Definition
|
|
Term
| Which of the following processes help deposit the toner from the EP drum onto paper? |
|
Definition
|
|
Term
| What type of cables is most expensive in terms of cost, installation, and maintenance? |
|
Definition
|
|
Term
| Give and example of an IP address that is used a loopback. |
|
Definition
|
|
Term
| What protocol is responsible for addressing hosts in a TCP/IP-based network? |
|
Definition
|
|
Term
| What troublshooting utility is common to all operating systems and is used for testing connectivity of two hosts on a network? |
|
Definition
|
|
Term
| What authentication technologies utilzes a challenge text? |
|
Definition
|
|
Term
| What method provides an outer layer of security for shared folders stored on an NTFS volume? |
|
Definition
|
|
Term
| What is the best method for preventing social engineering attacks? |
|
Definition
|
|
Term
| What acontains essential information about the handling, storage, and safe disposal of hazardous chemicals? |
|
Definition
|
|
Term
| You have been asked to install an IDE disk to a personal computer. This will be the only disk in the computer connected to the primary channel. How would you set the jumper? |
|
Definition
|
|
Term
| What method can be used to test a 10/100 Mbps network port built on the motherboard without connecting it to the network? |
|
Definition
|
|
Term
| What is considered to be the fastes port and is commonly used on laptops? |
|
Definition
|
|
Term
| Which wireless IEEE standard uses a radio frquency of 2.4 GHz with a data transfer speed of 11 Mbps? |
|
Definition
|
|
Term
| What part in a laser printer is used to transfer a high positive voltage to charge the paper? |
|
Definition
|
|
Term
| Which of the following printers is usitable for pringint multipart invoices? |
|
Definition
|
|
Term
| What port cannot be used to connect a canner? |
|
Definition
|
|
Term
| What type of cable is not prone to electromagnetic interferences? |
|
Definition
|
|
Term
| What component of an IP address is used to distinguish the network address from a host address? |
|
Definition
|
|
Term
| What device connects different network segments and uses tables to create a map of the network topology? |
|
Definition
|
|
Term
| Which network topology does not allow yo to add or remove computers without affecting the network? |
|
Definition
|
|
Term
| What authentication method uses the physical characteristics of a user to verify identity? |
|
Definition
|
|
Term
| What media access method is utized in 802.11b wireless networks? |
|
Definition
|
|
Term
| What type of network is configured in dual rings to provide fault tolerance? |
|
Definition
|
|
Term
| What is the maximum length of a UTP cable segment in a 10BastT star network? |
|
Definition
|
|
Term
| What term correctly describes the loss of signal while it travels down a particular medium? |
|
Definition
|
|
Term
| What effects the performance of an 802.11b network? |
|
Definition
|
|
Term
| What network devices forwards the data it receives on a port to all other connected ports? |
|
Definition
|
|
Term
| What devices is used in Token Ring networks as the central device? |
|
Definition
|
|
Term
| What protocol uses a MAC address as part of the host address? |
|
Definition
|
|
Term
| What protocol does not depend on addresses or numbers to identify computers on a network? |
|
Definition
|
|
Term
| What protocol suites includes the Routing Table Maintnenance protocol (RTMP)? |
|
Definition
|
|
Term
| At what layer of the OSI network model does a network adapter work? |
|
Definition
|
|
Term
| One of the netowrk administrators in your company has asked you to block port 23 on the router. What service is he asking you to block? |
|
Definition
|
|
Term
| What protocol is used to secure HTTP transactions on the Internet? |
|
Definition
|
|
Term
| What protocol can be used to secure remote access connections when they are established through the Internet? |
|
Definition
|
|
Term
| What is the total bandwidth of an ISDN BRI connection when both data channels are used? |
|
Definition
|
|
Term
| You need to allow only secure Internet traffic in and out of your company network. What port would you open on the firewall? |
|
Definition
|
|
Term
| You are using five 80 GB hard disks in your files server to confiure RAID-5. What will be the maximum copacity of the disk after the configuration is complete? |
|
Definition
|
|
Term
| What do you call a power outage that lasts for a long period of time? |
|
Definition
|
|
Term
| What utility would yu use when a Windows XP user in not able to connect using computer names? |
|
Definition
|
|
Term
| What utility us used on a Linux system to verify TCP/IP configuration? |
|
Definition
|
|
Term
| What authentication method is used with timestamped session tickets? |
|
Definition
|
|
Term
| What is known as a label-based access control method and is hardcoded into a device? |
|
Definition
|
|
Term
| What has the necessary privileges to assign permissions to a shared resource when the discretionary access control method is used? |
|
Definition
| The owner of the Resource |
|
|
Term
| An e-commerce web site is using digital certificates. Which part of authentication, access control, and auditing (AAA) is provided by these certificates? |
|
Definition
|
|
Term
| What transport protocol is used by TACACS+? |
|
Definition
|
|
Term
| You have decided to used WEP for securing the wireless network segment in the organization. What describes the user who wants to connect to the secure network? |
|
Definition
|
|
Term
| You have decided to implement IPSec protocol to provide secure end-to-end communication to remote access clients. In what mode should you implement this protocol? |
|
Definition
|
|
Term
| Identify the 802.1x method that can be used for mutual authentication of the supplicant and the authenticator. |
|
Definition
|
|
Term
| What authentication methods are defined by the 802.11 wireless standard? (2) |
|
Definition
|
|
Term
| You have installed an intrusion detection system on one of the production servers to monitor malicious activities of applications and users only on that server. What kind of IDS is this? |
|
Definition
|
|
Term
| What is the main weakness of sysmmetric encryption algorithms? |
|
Definition
|
|
Term
| What is used to allow users to access resources on different servers in the domain when they log on to their computers? |
|
Definition
|
|
Term
| State the range of Class A IPs. |
|
Definition
|
|
Term
| State the range of Class B IPs. |
|
Definition
|
|
Term
| State the range of Class C IPs. |
|
Definition
|
|
Term
| State the range of Class D IPs. |
|
Definition
| 224.0.0.0-239.255.255.255 |
|
|
Term
| What are Class E IPs used for? |
|
Definition
| Experimental and reserved for future testing purposes. |
|
|
Term
| What are Class D IPs used for? |
|
Definition
| Multicasting Applications |
|
|